These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references.
Students may use these solutions for personal skill-building and practice.
Unethical use is strictly forbidden.
Problem One: Determining if nefarious activity has indeed occurred
In the CyberNav scenario, a set of technical aspects are highlighted. One of the most important is unauthorized access or hacking. Just as it is revealed in the case study, access necessarily means gaining entry into, communicating or instructing with the arithmetical, logical, or memory function resources of a computer system. Even though the employees at CyberNav have been permitted to access the sensitive information, it is only when they are within the organization. However, it is indicated that some of them are accessing the sensitive data remotely and this makes their access unauthorized.
A further technical aspect involved is confidentiality. Apparently, CyberNav is a custodian of top-secret industrial information. Such information, as profiled by Holt, Bossler, and Seigfried-Spellar (2015), is highly pertinent and should be safeguarded against illegal access. CyberNav ensures the safety of this information by making it available only through VPN. A further technical aspect of the scenario is an attack on a network system. The aspect is evidenced by the unusual computer traffic occurring through the VPN connection. It is through the network that CyberNav usually communicates with relevant personnel, who are the employees in this case, but some workers, and possibly outsiders, are taking undue advantage.
The security staff and information technology experts could use several methods to identify whether cybercrime has been perpetrated in the scenario under question. One of the most productive models is to collect security logs and analyze them for abnormal or suspicious activities. As informed by Yen, Oprea, Onarlioglu, Leetham, Robertson, Juels, and Kirda (2013), this action plan calls on the security personnel to look for credential logins or even application executions on the VPN. With this, it follows that the precise time in which access to the VPN-protected materials was done will be effectively determined. Hence, the security personnel will know whether there was access to sensitive and confidential information during non-business hours.
At the same time, collecting and analyzing the log files will allow the security personnel to know the IP address of the devices from which the remote access to confidential CyberNav information was initiated. If the IP address is tracked effectively, it is anticipated that the culprit will be identified more seamlessly.
This is only a preview of the solution.
Please use the purchase button to see the entire solution.